General

  • Target

    d4e4cf8c41bb1577b18afd03749b5ea4b575e24051714e55a97c008ddc678dd7N

  • Size

    70KB

  • MD5

    653f8b08a619a7dcb179de3411735320

  • SHA1

    8d5e8d215e7f78d5a2f9a63b78f6e4bc71133db0

  • SHA256

    d4e4cf8c41bb1577b18afd03749b5ea4b575e24051714e55a97c008ddc678dd7

  • SHA512

    680f179aae9f52d5a8880766713298e3bcde96a16a06ef9b0b1b45d3d7fda085636c3f0e656b359d65f7729f52f6b08d40d5dbc14476efb326be9ce70fab4b82

  • SSDEEP

    1536:gFTnqpKxynVBGeifCSzTPb542HkLbvJfxa:gFTQGeifrvb59H+bvJ5a

Score
10/10

Malware Config

Extracted

Family

blacknet

Botnet

HacKed

C2

https://lovegunny.net

Mutex

BN[tuFcXBCi-9342877]

Attributes
  • antivm

    true

  • elevate_uac

    false

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    2965b7eabf9eb6ce83de7d2260ab71ba

  • startup

    true

  • usb_spread

    true

Signatures

  • BlackNET payload 1 IoCs
  • Blacknet family
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d4e4cf8c41bb1577b18afd03749b5ea4b575e24051714e55a97c008ddc678dd7N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections